Privacy

Online
Essay
Digital Authoritarianism
Danielle Keats Citron
Danielle Keats Citron is a Jefferson Scholars Foundation Schenck Distinguished Professor in Law, University of Virginia School of Law; Vice President, Cyber Civil Rights Initiative; 2019 MacArthur Fellow.

Special thanks to Mario Barnes, Courtney Douglas, Paul Gowder, Deborah Turkheimer, to the audience at Northwestern Law’s Julian Rosenthal Lecture, and to Miranda Coombe, Sam Hallam, Caroline Kassir, and Danielle O’Connell for superb editing. Adeleine Lee and Alex Wilfert provided excellent research assistance. The authors contributed equally to this essay.

Ari Ezra Waldman
Ari Ezra Waldman is a Professor of Law and, by courtesy, Professor of Sociology, University of California, Irvine School of Law; Member and Compliance Officer, Board of Directors, Cyber Civil Rights Initiative.

Antidemocratic forces rely on intimidation tactics to silence criticism and opposition. Today’s intimidation playbook follows a two-step pattern. We surface these tactics so their costs to public discourse and civic engagement can be fully understood. We show how the misappropriation of the concept of online abuse has parallels in other efforts at conceptual diversion that dampen democratic guarantees. Democracy’s survival requires creative solutions. Politicians and government workers must be able to operate free from intimidation. Journalists and researchers must be able to freely investigate governmental overreach and foreign malign influence campaigns that threaten the democratic process. Surfacing the two-step strategy is a critical start to combating it.

Print
Comment
Volume 92.4
Identifiable to Whom? Clarifying Biometric Privacy Rights in Illinois and Beyond
Hana Ferrero
B.A. 2021, University of Notre Dame; J.D. Candidate 2026, The University of Chicago Law School.

I would like to thank Jack Brake, Anne Marie Hawley, and Jonah Klausner for their thoughtful edits and Jake Holland for his indispensable advice all throughout the drafting process.

Illinois’s Biometric Information Privacy Act (BIPA) is the country’s most powerful law governing biometric data—data generated from an individual’s biological characteristics, like fingerprints and voiceprints. Over the past decade, BIPA garnered a reputation as an exceptionally plaintiff-friendly statute. But from 2023–2024, the Illinois legislature, Illinois Supreme Court, and Ninth Circuit Court of Appeals all sided with BIPA defendants for the first time. Most significantly, in Zellmer v. Meta Platforms, Inc., the Ninth Circuit dismissed the plaintiff’s BIPA claim because the face scan collected by the defendant could not be used to identify him.

It is unclear whether these developments represent a trend or an exception to BIPA’s plaintiff-friendliness. Which path is charted will largely turn on how courts interpret Zellmer: While Zellmer established that a biometric identifier must be able to identify an individual, lower courts have construed its holding narrowly to require that the entity collecting biometric data must itself be capable of identifying, rather than it being sufficient for any entity to do so. Reading BIPA this narrowly would significantly weaken the statute’s protections.

After detailing how employer and consumer cases catalyzed this recent defendant-friendly shift, this Comment proposes a two-step framework to determine whether a biometric identifier is able to identify, falling under BIPA’s reach. Given BIPA’s broad influence, where courts ultimately land on this question will be crucial to the protection of biometric data nationwide."

Print
Comment
Volume 92.4
Transparency Without Teeth: An Empirical Understanding of Data Broker Regulation
Elijah Greisz
B.S. 2022, University of Washington; M.S. 2023, University of Washington; J.D. Candidate 2026, The University of Chicago Law School.

I would like to thank Professor Lior Strahilevitz and the editors and staff of the University of Chicago Law Review for their thoughtful advice and insight.

Recently, many states have reacted to the growing data economy by passing data privacy statutes. These follow the “interaction model”: they allow consumers to exercise privacy rights against firms by directly interacting with them. But data brokers, firms that buy and sell data for consumers whom they do not directly interact with, are key players in the data economy. How is a consumer meant to exercise their rights against a broker with an “interaction gap” between them?

A handful of states have tried to soften the interaction gap by enacting data-broker-specific legislation under the “transparency model.” These laws, among other things, require brokers to publicly disclose themselves in state registries. The theory is that consumers would exercise their rights against brokers if they knew of the brokers’ existence. California recently went further with the Delete Act, providing consumers data-broker-specific privacy rights.

Assembling brokers’ reported privacy request metrics, this Comment performs an empirical analysis of the transparency model’s efficacy. These findings demonstrate that the transparency model does not effectively facilitate consumers in following through on their expected privacy preferences or meaningfully impacting brokers. Therefore, regulators should follow in the footsteps of the Delete Act and move beyond the transparency model.

Online
Essay
Indivisibilities in Technology Regulation
Lauren Henry Scholz
Lauren Scholz is an Assistant Professor of Law at the Florida State University College of Law.

Lee Fennell’s Slices and Lumps: Division and Aggregation in Law and Life reveals the benefits of isolating configurations in legal analysis. A key characteristic of configurations, or “lumps” whether found or created, is that they are indivisible.

2
Essay
Pseudonymous Litigation
Lior Jacob Strahilevitz
Deputy Dean, Professor of Law and Walter Mander Teaching Scholar, The University of Chicago Law School

The author thanks Omri Ben-Shahar, Alison LaCroix, Jonathan Masur, Paul Ohm, KarlNicholas Peifer, Matt Tokson, Paul Schwartz, and my editors at The University of Chicago Law Review for helpful comments and suggestions on earlier drafts, as well as Katie Heinrichs for excellent research assistance, and the Morton C. Seeley Fund and Milton and Miriam Handler Foundation for research support.

2
Essay
75.1
Privacy versus Antidiscrimination
Lior Jacob Strahilevitz
Professor of Law and Walter Mander Teaching Scholar, The University of Chicago Law School

The author thanks Ronen Avraham, Howard Beales, Nevin Gewertz, Bernard Harcourt, Uri Itkin, Sarah Lawsky, Ronald Lee, Doug Lichtman, Tom Miles, Beth Milnikel, Jide Nzelibe, Adam Samaha, Max Schanzenbach, Paul Schwartz, David Weisbach, and Noah Zatz for their comments and suggestions, Levi Giovanetto for research assistance, and the Morton C. Seeley Fund and Visa, USA, Inc for generous research support. The author particularly thanks participants in The University of Chicago Law School’s Surveillance Symposium for their suggestions, as well as workshop participants at Northwestern and The University of Chicago.

2
Essay
75.1
Government Data Mining and the Fourth Amendment
Christopher Slobogin
Stephen C. O’Connell Professor of Law, University of Florida Fredric G. Levin College of Law

The author would like to thank participants in workshops at Stanford Law School and Florida Law School for their feedback on the content of this article, and Victoria Ianni for her research assistance. This paper is a version of a talk given at The University of Chicago Law School’s Surveillance Symposium, June 15–16, 2007.

2
Essay
75.1
Reviving Telecommunications Surveillance Law
Paul M. Schwartz
Professor of Law, UC Berkeley School of Law, Director, Berkeley Center for Law and Technology

My work on this paper began while I was a Professor of Law at Brooklyn Law School, and it benefited there from the support of the Milton and Miriam Handler Foundation. It also received support from the Dean’s Research Fund at Brooklyn Law School as well as a summer research grant from Boalt Hall. Patricia Bellia, Jon Michaels, Chris Slobogin, Stephen Sugarman, and Frank Zimring offered helpful suggestions.

2
Essay
75.1
Privacy, Surveillance, and Law
Richard A. Posner
Judge, United States Court of Appeals for the Seventh Circuit; Senior Lecturer in Law, The University of Chicago

This is a revised draft of my talk at The University of Chicago Law School’s Surveillance Symposium, June 15–16, 2007. I draw heavily on my books Not a Suicide Pact: The Constitution in a Time of National Emergency ch 6 (Oxford 2006) and Countering Terrorism: Blurred Focus, Halting Steps ch 7 (Rowman & Littlefield 2007).